A talk for Jersey Digital Parenting Day, discussing why we need parental controls, demonstrating the basic setup including create a live account, web filtering and other controls.
This document discusses several technology tools that can make life easier, including password managers, cloud storage services, and screen sharing/online meeting tools. It introduces LastPass for password management, Dropbox for file storage and sharing across devices, and TeamViewer for remote screen sharing and online meetings. It also provides additional resources on using technology in education.
This document discusses how mobile phones and smartphones can be used as tools for technology in teaching. It provides examples of how the camera, voice recorder, screen, internet browser, and software on smartphones can support functions like recording lessons, sharing content, displaying pictures and videos, researching topics, and assessing students. It also lists some specific apps and websites like Skype, Viber, and online English teaching resources that can be used to incorporate mobile technology into instruction.
This document discusses responsive web design and some of the challenges involved. It outlines different screen sizes that responsive designs need to accommodate, from smartphones to tablets to larger devices. It notes that there are no standards and differences between layouts can be large. It also acknowledges that responsive design may not always provide the best user experience and that very advanced techniques or sacrificing user experience may be needed in some cases.
ICALT 2010: Supporting Exception Handling in Scripted Collaborative CoursesRoberto Perez-Rodriguez
This document proposes an approach to handling exceptions and runtime changes in scripted collaborative online courses. It presents a process language based on PoEML that allows for runtime changes to course control flow through dynamic modeling. The approach classifies exceptions and defines an execution semantics to transition between situations and allow process instances to change states due to modifications to the process definition. It describes handling unexpected exceptions through either ad-hoc or dynamic changes to process instances and schemas. The goal is to address limitations in how current systems handle exceptions during execution of collaborative online courses.
Branching by abstraction was chosen as a solution to address unwanted functionality being released from SALES-II due to its subtasks progressing at different paces than other components. This involved creating a feature switch per user story and controlling functionalities through a web interface. However, switches can lead to complex spaghetti code, technical debt if not removed, hard to test scenarios, and configuration risks if dependencies exist between switches. Best practices include minimizing switch surfaces and removing switches once functionality is in production. Alternatives considered synchronizing component developments.
The document discusses starting a Jersey Windows User Group (JWUG) to bring together IT professionals in Jersey to discuss best practices, receive technical training, and provide feedback to Microsoft. The group would focus on Microsoft core infrastructure and partner products. Local events would include technical talks and discussions over free food and drinks to network and learn without sales pitches. Sponsorship levels would help fund events, and a website would facilitate discussions, surveys, and group discounts.
This document discusses several technology tools that can make life easier, including password managers, cloud storage services, and screen sharing/online meeting tools. It introduces LastPass for password management, Dropbox for file storage and sharing across devices, and TeamViewer for remote screen sharing and online meetings. It also provides additional resources on using technology in education.
This document discusses how mobile phones and smartphones can be used as tools for technology in teaching. It provides examples of how the camera, voice recorder, screen, internet browser, and software on smartphones can support functions like recording lessons, sharing content, displaying pictures and videos, researching topics, and assessing students. It also lists some specific apps and websites like Skype, Viber, and online English teaching resources that can be used to incorporate mobile technology into instruction.
This document discusses responsive web design and some of the challenges involved. It outlines different screen sizes that responsive designs need to accommodate, from smartphones to tablets to larger devices. It notes that there are no standards and differences between layouts can be large. It also acknowledges that responsive design may not always provide the best user experience and that very advanced techniques or sacrificing user experience may be needed in some cases.
ICALT 2010: Supporting Exception Handling in Scripted Collaborative CoursesRoberto Perez-Rodriguez
This document proposes an approach to handling exceptions and runtime changes in scripted collaborative online courses. It presents a process language based on PoEML that allows for runtime changes to course control flow through dynamic modeling. The approach classifies exceptions and defines an execution semantics to transition between situations and allow process instances to change states due to modifications to the process definition. It describes handling unexpected exceptions through either ad-hoc or dynamic changes to process instances and schemas. The goal is to address limitations in how current systems handle exceptions during execution of collaborative online courses.
Branching by abstraction was chosen as a solution to address unwanted functionality being released from SALES-II due to its subtasks progressing at different paces than other components. This involved creating a feature switch per user story and controlling functionalities through a web interface. However, switches can lead to complex spaghetti code, technical debt if not removed, hard to test scenarios, and configuration risks if dependencies exist between switches. Best practices include minimizing switch surfaces and removing switches once functionality is in production. Alternatives considered synchronizing component developments.
The document discusses starting a Jersey Windows User Group (JWUG) to bring together IT professionals in Jersey to discuss best practices, receive technical training, and provide feedback to Microsoft. The group would focus on Microsoft core infrastructure and partner products. Local events would include technical talks and discussions over free food and drinks to network and learn without sales pitches. Sponsorship levels would help fund events, and a website would facilitate discussions, surveys, and group discounts.
Achtung! wolfenstien - The objective of this interactive presentation is to raise awareness of some benefits of video games, to reassure people that’s its an acceptable and growing leisure time. To help adults and children become more informed when deciding how much is too much and give some guidance on building social and acceptable play strategies.
This document proposes an architectural approach to orchestrate online engineering education courses using third-party tools. It involves a central execution engine that runs course scripts written in an Educational Modeling Language (EML). This engine acts as an orchestra director that controls the behavior of multiple groupware tools in accordance with the course script. It also involves a middleware to integrate these third-party tools. The authors developed a prototype to test this approach, with the execution engine as a Java-based web app and authoring/monitoring interfaces as Moodle extensions. Their approach differs from related work by using an EML to support social collaboration over third-party tools and a method to integrate legacy engineering education tools.
This document discusses approaches to adaptation in educational modeling languages and describes a framework for late modeling of learning flows defined using PoEML. It introduces the concept of placeholders that allow parts of a learning flow to be left unspecified during design and modeled at runtime. The framework was implemented as a Moodle extension, including authoring, monitoring, and delivery modules. The implementation supports late modeling of PoEML learning flows while tracking individual learner instances. Future work includes adapting learning flows based on execution using instance and type adaptation.
Jersey Digital Momentum - e 1’s and 0’s per sq km than you might think”
A talk given in London to the chairs and representatives of 10 international groups, members of council & trustees.
Integrating and Monitoring System Center Virtual Machine Manager with Operati...Ronnie Isherwood
This document discusses integrating Virtual Machine Manager (VMM) with Operations Manager (OM) for monitoring. It provides an overview of VMM architecture and components that should be monitored, such as the VMM server, hosts, storage, and fabrics. It describes prerequisites for integration like installing OM agents and management packs. Demo sections show configuring the integration in OM and using dashboards, alerts, and reports. The key takeaway is that monitoring empowers support staff by reducing troubleshooting time and complexity.
In this talk the objective is to introduce Virtual Reality in a fun and informative way. The talk is short, exciting and should get the brain going. The main focus is ensuring the audience is blown away by how big Virtual Reality is about to become and that they can be a part of it now. Who’s backing it to make it happen? The Smackdown is the reality showdown, why didn’t it pick up the last time, the big folks were there then.
Service Delivery & Automation Configure & DeployRonnie Isherwood
An older (online) presentation I've given for Microsoft on service delivery and automation using Microsoft System Center Service Manager and Orchestrator.
Building solutions with microsoft virtualisationRonnie Isherwood
Based on Microsoft TechEd virtualization 360 talks this is my first community based presentation given in Jersey. A very real-world look using Microsoft slide decks and discussing all type of virtualization technology.
Protecting Microsoft Virtualization with DPM 2012 R2Ronnie Isherwood
This session explain the features of Data Protection Manager that help you protect your Microsoft server virtualization environment. The session will include consideration for your virtual machines hosted on standalone Hyper-V hosts and Hyper-V clusters that use CSV or SMB storage. We also cover Item Level Recovery and brief introduction to Windows Azure Backup for DPM.
Managing hypervisors with System Center Virtual Machine Manager 2012Ronnie Isherwood
A Virtual Machine Manager 2012 Overview discussing deployment and architecture the looking at heterogeneous scenarios, versions and requirements then wrapping up with troubleshooting and questions.
In this session Ronnie and Kevin will provide a brief history of authentication, discuss today’s authentication risks and
challenges then look at how modern multi-factor authentication services can help keep businesses and access to
their data secure and compliant. The talk covers cloud services, on premise servers, RADIUS and mobile devices. It
will also explores what’s next with Windows 10 Hello and Passport technologies before wrapping up with a Q&A.
Part of a series introducing desktop delivery technologies. This talk introduced Remote Desktops Services (RDS) in Windows Server 2012. It explains what is Virtual Desktop Infrastructure (VDI), how applications are deliver, covers some key challenges including management and monitoring. It wraps up with where you can find out more including courses and MVA.
Juliette Melton at BayCHI: Real World Remote ResearchBayCHI
Remote research can raise the quality and lower the costs of your user research efforts; using a combination of surveys, video, screensharing, and phone, you can connect with a much broader range of users than you could using traditional lab-based usability tests, while using resources more efficiently than you would doing contextual research. In this workshop-style talk, Juliette Melton will cover recruiting sources, technology tools, and caveats you might not have thought of, including managing time zones and participant distraction. We will also address pros and cons of increasingly popular non-scripted research services.
Juliette Melton at BayCHI: Real World Remote ResearchBayCHI
Remote research can raise the quality and lower the costs of your user research efforts; using a combination of surveys, video, screensharing, and phone, you can connect with a much broader range of users than you could using traditional lab-based usability tests, while using resources more efficiently than you would doing contextual research. In this workshop-style talk, Juliette Melton will cover recruiting sources, technology tools, and caveats you might not have thought of, including managing time zones and participant distraction. We will also address pros and cons of increasingly popular non-scripted research services.
Going Remote: User experiences at a distancelinoleumjet
This document discusses the benefits and challenges of conducting remote user research. Some key benefits include ease of recruiting participants, ability to observe participants in their real environments, and no limits on the number of observers. However, challenges include limited participation to those with fast internet, risks of technical failures, and inability to see participant faces. The document provides recommendations for how to structure remote research, including using scheduled moderated sessions, recruiting participants, obtaining consent, using screen sharing software, and dealing with technical issues. Real examples are provided of companies that have successfully used remote research.
This document discusses mind map driven heuristic exploratory testing. It describes exploratory testing as an approach and mindset focused on learning through design and testing using heuristics. Various product elements are discussed as models for measuring test coverage, including structure, functions, data, platform, operations, and time. Risks and bugs are also covered. The document provides examples of heuristics and encourages getting mind maps out to better understand contexts.
Presentation internet safety & security by idaho web marketing meetupJason Weaver
This document discusses internet safety and security. It provides 4 ways to learn internet marketing including internships, local education meetings, online tools and training, and blogs. It discusses the various devices and services used at home and away and how to protect families, employees and oneself from wasting time, addiction, and being taken advantage of online. It recommends setting up filters, antivirus software, parental controls, and web search restrictions on all devices and services. It also suggests monitoring internet activity and having discussions about internet safety. Overall, the document provides tips and recommendations for maintaining security and safety for all users online.
This document provides an overview of a presentation for parents on digital literacy and parenting in the digital age. It discusses digital life and literacy, technology used for learning at NIS including MacBooks, iWork, wikis and iCal. It covers tips for parents on social networks, online gaming, creating secure passwords and balancing digital and non-digital activities. It also advertises a workshop on creating podcasts.
Unity: What does it take to port a browser title to mobilesDevGAMM Conference
Been doing a browser game that happened to be shipping on mobiles first? That’s a popular case that has a proper solution. Let’s study how we make it with Unity projects.
Achtung! wolfenstien - The objective of this interactive presentation is to raise awareness of some benefits of video games, to reassure people that’s its an acceptable and growing leisure time. To help adults and children become more informed when deciding how much is too much and give some guidance on building social and acceptable play strategies.
This document proposes an architectural approach to orchestrate online engineering education courses using third-party tools. It involves a central execution engine that runs course scripts written in an Educational Modeling Language (EML). This engine acts as an orchestra director that controls the behavior of multiple groupware tools in accordance with the course script. It also involves a middleware to integrate these third-party tools. The authors developed a prototype to test this approach, with the execution engine as a Java-based web app and authoring/monitoring interfaces as Moodle extensions. Their approach differs from related work by using an EML to support social collaboration over third-party tools and a method to integrate legacy engineering education tools.
This document discusses approaches to adaptation in educational modeling languages and describes a framework for late modeling of learning flows defined using PoEML. It introduces the concept of placeholders that allow parts of a learning flow to be left unspecified during design and modeled at runtime. The framework was implemented as a Moodle extension, including authoring, monitoring, and delivery modules. The implementation supports late modeling of PoEML learning flows while tracking individual learner instances. Future work includes adapting learning flows based on execution using instance and type adaptation.
Jersey Digital Momentum - e 1’s and 0’s per sq km than you might think”
A talk given in London to the chairs and representatives of 10 international groups, members of council & trustees.
Integrating and Monitoring System Center Virtual Machine Manager with Operati...Ronnie Isherwood
This document discusses integrating Virtual Machine Manager (VMM) with Operations Manager (OM) for monitoring. It provides an overview of VMM architecture and components that should be monitored, such as the VMM server, hosts, storage, and fabrics. It describes prerequisites for integration like installing OM agents and management packs. Demo sections show configuring the integration in OM and using dashboards, alerts, and reports. The key takeaway is that monitoring empowers support staff by reducing troubleshooting time and complexity.
In this talk the objective is to introduce Virtual Reality in a fun and informative way. The talk is short, exciting and should get the brain going. The main focus is ensuring the audience is blown away by how big Virtual Reality is about to become and that they can be a part of it now. Who’s backing it to make it happen? The Smackdown is the reality showdown, why didn’t it pick up the last time, the big folks were there then.
Service Delivery & Automation Configure & DeployRonnie Isherwood
An older (online) presentation I've given for Microsoft on service delivery and automation using Microsoft System Center Service Manager and Orchestrator.
Building solutions with microsoft virtualisationRonnie Isherwood
Based on Microsoft TechEd virtualization 360 talks this is my first community based presentation given in Jersey. A very real-world look using Microsoft slide decks and discussing all type of virtualization technology.
Protecting Microsoft Virtualization with DPM 2012 R2Ronnie Isherwood
This session explain the features of Data Protection Manager that help you protect your Microsoft server virtualization environment. The session will include consideration for your virtual machines hosted on standalone Hyper-V hosts and Hyper-V clusters that use CSV or SMB storage. We also cover Item Level Recovery and brief introduction to Windows Azure Backup for DPM.
Managing hypervisors with System Center Virtual Machine Manager 2012Ronnie Isherwood
A Virtual Machine Manager 2012 Overview discussing deployment and architecture the looking at heterogeneous scenarios, versions and requirements then wrapping up with troubleshooting and questions.
In this session Ronnie and Kevin will provide a brief history of authentication, discuss today’s authentication risks and
challenges then look at how modern multi-factor authentication services can help keep businesses and access to
their data secure and compliant. The talk covers cloud services, on premise servers, RADIUS and mobile devices. It
will also explores what’s next with Windows 10 Hello and Passport technologies before wrapping up with a Q&A.
Part of a series introducing desktop delivery technologies. This talk introduced Remote Desktops Services (RDS) in Windows Server 2012. It explains what is Virtual Desktop Infrastructure (VDI), how applications are deliver, covers some key challenges including management and monitoring. It wraps up with where you can find out more including courses and MVA.
Juliette Melton at BayCHI: Real World Remote ResearchBayCHI
Remote research can raise the quality and lower the costs of your user research efforts; using a combination of surveys, video, screensharing, and phone, you can connect with a much broader range of users than you could using traditional lab-based usability tests, while using resources more efficiently than you would doing contextual research. In this workshop-style talk, Juliette Melton will cover recruiting sources, technology tools, and caveats you might not have thought of, including managing time zones and participant distraction. We will also address pros and cons of increasingly popular non-scripted research services.
Juliette Melton at BayCHI: Real World Remote ResearchBayCHI
Remote research can raise the quality and lower the costs of your user research efforts; using a combination of surveys, video, screensharing, and phone, you can connect with a much broader range of users than you could using traditional lab-based usability tests, while using resources more efficiently than you would doing contextual research. In this workshop-style talk, Juliette Melton will cover recruiting sources, technology tools, and caveats you might not have thought of, including managing time zones and participant distraction. We will also address pros and cons of increasingly popular non-scripted research services.
Going Remote: User experiences at a distancelinoleumjet
This document discusses the benefits and challenges of conducting remote user research. Some key benefits include ease of recruiting participants, ability to observe participants in their real environments, and no limits on the number of observers. However, challenges include limited participation to those with fast internet, risks of technical failures, and inability to see participant faces. The document provides recommendations for how to structure remote research, including using scheduled moderated sessions, recruiting participants, obtaining consent, using screen sharing software, and dealing with technical issues. Real examples are provided of companies that have successfully used remote research.
This document discusses mind map driven heuristic exploratory testing. It describes exploratory testing as an approach and mindset focused on learning through design and testing using heuristics. Various product elements are discussed as models for measuring test coverage, including structure, functions, data, platform, operations, and time. Risks and bugs are also covered. The document provides examples of heuristics and encourages getting mind maps out to better understand contexts.
Presentation internet safety & security by idaho web marketing meetupJason Weaver
This document discusses internet safety and security. It provides 4 ways to learn internet marketing including internships, local education meetings, online tools and training, and blogs. It discusses the various devices and services used at home and away and how to protect families, employees and oneself from wasting time, addiction, and being taken advantage of online. It recommends setting up filters, antivirus software, parental controls, and web search restrictions on all devices and services. It also suggests monitoring internet activity and having discussions about internet safety. Overall, the document provides tips and recommendations for maintaining security and safety for all users online.
This document provides an overview of a presentation for parents on digital literacy and parenting in the digital age. It discusses digital life and literacy, technology used for learning at NIS including MacBooks, iWork, wikis and iCal. It covers tips for parents on social networks, online gaming, creating secure passwords and balancing digital and non-digital activities. It also advertises a workshop on creating podcasts.
Unity: What does it take to port a browser title to mobilesDevGAMM Conference
Been doing a browser game that happened to be shipping on mobiles first? That’s a popular case that has a proper solution. Let’s study how we make it with Unity projects.
The document discusses approaches for testing mobile websites, including selecting devices, prioritizing test cases, paired scripted and exploratory testing, testing techniques like galumphing, and tools for testing responsiveness; lessons learned include proof of concepts, pairing testers, prior investigation and research; and the future of mobile web testing may include new operating systems and integration with other devices.
Secure Yourself, Practice what we preach - BSides Austin 2015Michael Gough
This document discusses various methods for securing personal devices and systems. It provides tips for using password managers, multi-factor authentication, browser security settings, encrypted backups, and restricting administrative privileges to help protect against malware and identity theft. The document also addresses security best practices for social media, wireless networks, and monitoring children's cell phone usage.
Data Privacy Day is observed internationally on January 28th each year to encourage awareness of privacy and protection of personal data. The document provides tips for securing personal information when using devices, applications, online banking, social media and Wi-Fi networks. Readers are encouraged to use strong and unique passwords, update software regularly, carefully consider what is shared online, and utilize privacy tools to block tracking and secure data.
This document provides a 10-lesson introduction to computers. [Lesson 1 defines computers and their basic components and common uses. Lesson 2 discusses computer hardware, including the monitor, tower, keyboard, mouse and other peripherals. Lesson 3 demonstrates computer ports and buttons.] The remaining lessons cover operating systems, software, internet connectivity, online safety, cloud computing, mobile devices and cleaning computers. The document aims to build basic understanding of computers for new users.
This document provides an introduction to computers for beginners. It discusses different types of computers, operating systems, computer components like the keyboard and mouse, and basic functions like creating and saving files. The learning objectives are to become comfortable using a computer by learning about its parts and basic tasks. Types of computers covered include desktops, laptops, tablets, phones, TVs and game consoles. Operating systems mentioned are Windows and Mac OS.
This document provides an introduction to IT security for nonprofits. It discusses balancing security needs with limited budgets and lack of awareness. It then outlines seven easy steps for nonprofits to improve security, including keeping software updated, using enterprise antivirus, cultivating aware users, balancing privacy and security with productivity, understanding compliance needs, establishing strong password policies, and staying informed through security resources. The presentation includes questions for attendees about their experiences and challenges with security.
Strategies for Mobile Web Application TestingTechWell
This document discusses strategies for testing mobile web applications. It outlines approaches like paired scripted and exploratory testing. It also covers techniques for testing responsive designs across different devices and resolutions. Lessons learned include the benefits of pairing, prior investigation, and continuous research. The future of mobile web testing is discussed as involving evolving tools, new platforms and programming languages, and increased device integration.
This document is an introduction to mobile software testing presented by Stephen Janaway. It discusses why mobile testing is important given the huge mobile market and users' dependence on well-functioning mobile devices and applications. It also covers what types of mobile testing exist, including hardware, network protocols, applications, and more. Finally, it encourages getting involved in mobile testing as the field is growing rapidly and testing mobile applications is an easy way to break into the industry.
This document provides an introduction and overview of front-end web development. It discusses how everything is becoming web-based, from desktops to devices. Current trends in front-end technologies are highlighted, including HTML5 APIs, the rise of JavaScript frameworks, responsive design, and mobile web apps. Common front-end programming languages and platforms are also listed. The document outlines advantages and disadvantages of web applications, and provides statistics on the history and evolution of the web and front-end development. Expectations for the course are discussed, along with organizational details and the first homework assignment.
How to run accessible online meetings - AbilityNet Live event, April 2020AbilityNet
This session will focus on the key things to think about to ensure that disabled people can access and participate in online meetings, including university learning platforms.
It will include top tips for various platforms, including Microsoft Teams and Zoom.
It will be of interest to anyone who hosts meetings in a business, charity or university setting. It will feature automatic live captions.
It will be recorded and shared with anyone who registers.
Panelists include:
Robin Christopherson, AbilityNet
Adam Tweed, AbilityNet
Ghizzie Dunlop, UWE
Michael Vermeesch, Microsoft
Alistair McNaught, McNaught Consulting
Attention Parents, Educators, College Students and Community Members!
Computer Science Education Week is December 4 – 10 and we need your help to get more kids into the tech field!
Computers are everywhere, changing every industry on the planet. But only 1 in 4 schools teach computer science and our pipeline of new, educated computer programmers is dwindling. Good news is, we’re on our way to change this. If you’ve heard about the Hour of Code before, you might know it made history. More than 100 million students have tried an Hour of Code to kick-start their education into Computer Science.
Internet Safety tips for Parents of Christian Childrennickswebtsv
The internet has evolved into a enormous beast that has revolutionized the computer and communications world like nothing before. But with this revolution comes safety concerns for children whose parents wish to keep a watchful eye on their child's browsing habits.
This presentation covers family safety tools that empower parents to easily manage their child's exposure to explicit websites. Such as gambling, social media and online dating websites which can be used for the wrong reasons by pedophiles and the like.
The solutions available to parents range from device based security to software or host ran applications like NetNanny.
This document provides information and recommendations for protecting a family from inappropriate content online. It discusses statistics on pornography usage and notes the prevalence of social media as a means for predators. It recommends developing a spiritual and technical plan, including using parental controls and filters on devices that access the internet at home. Specific tools are outlined to filter content at the network level and on individual computers, phones, and other devices. Regular communication within the family is emphasized as the key part of an effective plan.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
2. Agenda
• Why do we need them?
• Run through the basic setup
• Create a live account, web filtering
• Discuss the Parental aspect
• Any other Controls
• Where to go for more information
• Questions?
3. Windows Devices
• Incredibly useful tools for
– Learning
– Communicating
– Creativity
– Work and Play
• Mixed age groups
– gateway to the internet
– have the potential to be misused
4. Windows
• Laptop
• Tablet
• Phone
• PC
• Console
Parental
• Presence
• Awareness
• Trust
• Monitor
Controls
• Password
• Age
• Time
• Lock